You are on page 1of 11

Perspectives

on Security
for the Board
April 2023 – Edition 1

April 2023
For more information, visit gcat.google.com
Perspectives on Security for the Board: Edition 1
For more information, visit gcat.google.com

Table of contents

Foreword 03

The Board’s Role in Cyber Risk Oversight 04

Helping Boards Navigate the Global Threat Landscape 06

Board Engagement on Artificial Intelligence 08


and Cybersecurity

Conclusion 09

2
Perspectives on Security for the Board: Edition 1
For more information, visit gcat.google.com

Foreword
As a Board Member and a CISO, we frequently questions about technology and digital capability, not
engage with company leadership across sectors just review what are often lagging indicators of cyber
on cybersecurity and technology risk. In these performance.
engagements, it is clear that cyber is top of mind for
every organization. To help with this effort, we’re releasing the first
edition of the Google Cybersecurity Action Team’s
As such, we thought it would be timely to share our Perspectives on Security for the Board report. This
perspective on how the Board can best address report series is intended to help Board members
cybersecurity and risk along with ways to take a more sharpen their cybersecurity knowledge – including
proactive role in these areas - now and in the future. how to address cyberattacks and understand how
One lesson we’ve learned is that Board awareness likely they are to impact their organization – and
and subsequent guidance in this area is absolutely prepare them for potential regulatory obligations.
critical to every organization’s long term success.
In this inaugural report, we (1) cover the Board’s roles
When we engage on these issues, Board members and responsibilities in cyber risk oversight; (2) provide
often ask: what types of conversations should we guidance on how Boards should navigate the cyber
be having about cybersecurity and what types of threat landscape; and (3) explain how Boards should
questions do we need to be asking our C-Suite? engage on emerging issues surrounding artificial
The answer is that Boards should work to ensure intelligence (AI) and cybersecurity. We hope you find it
that security management teams inventory critical informative and look forward to connecting with you
assets and business processes, convey top risks more on these important topics.
and mitigations (and measure their success), and
communicate accepted residual risk. Above all, Betsy Atkins (Chairman, Google Cloud Advisory Board)
Boards, CEOs and other executives should ask probing Phil Venables (CISO, Google Cloud)

3
Perspectives on Security for the Board: Edition 1
For more information, visit gcat.google.com

The Board’s Role in Cyber Risk


Oversight
Cyber-related risk remains one of the top concerns structures to achieve better cybersecurity outcomes.
facing organizations today. Addressing cyber risk is The Framework is made up of five functions - Identify,
a challenge for nearly any company and its Board, Protect, Detect, Respond, and Recover.
so it is increasingly important for Board members
• Identify: Assists in understanding what matters
to conduct relevant oversight and help guide risk
most to the organization, including critical business
management priorities. Governments globally are
services, systems, people, assets, data, and
increasingly implementing regulatory measures to
capabilities.
raise compulsory cybersecurity baseline standards,
including requirements to report cyber incidents to • Protect: Outlines appropriate safeguards to ensure
the relevant government authorities. In recent weeks, delivery of critical services and supports the ability
we’ve seen two such initiatives from the U.S. Securities to contain the impact of a potential cybersecurity
and Exchange Commission, which contain hundreds incident.
of pages of proposed rules on cybersecurity, incident • Detect: Helps in defining the appropriate activities
reporting, and systems integrity. to identify a cybersecurity event in a timely manner.
• Respond: Focuses on appropriate activities to
To be effective, Boards should view cyber risk through
take in the event of a cybersecurity incident while
the lens of overall business risk. This requires that
supporting the ability to contain the impact of a
Boards integrate cybersecurity and resiliency into
potential cybersecurity incident.
their business strategy, risk management practices,
budgeting, and resource allocation to underpin that • Recover: Defines activities to maintain resiliency
cyber risk is everyone’s responsibility. plans and to restore services that were impacted
due to a cybersecurity incident.
The National Institute of Standards and Technology
As regulatory risk increases at federal and state levels,
(NIST) Cybersecurity Framework (CSF) (CSF) can
Boards’ understanding of cybersecurity is more
be a useful tool for Boards when thinking about
critical than ever. We expect these trends will continue
cybersecurity. The NIST CSF is designed for use across
and blur across borders, geographies, and sectors
multiple industries of different sizes, and provides a
over time. Boards will play an important role in how
structured way and a common taxonomy for Boards
organizations respond to these trends and should
to have more impactful discussions with their CISO
prepare now for this future state. We encourage
and cybersecurity teams. What the NIST CSF and
Boards to adopt the following three principles for
other frameworks can do is enable us through their

4
Perspectives on Security for the Board: Edition 1
For more information, visit gcat.google.com

(The Board’s Role in Cyber Risk Oversight, cont’d.)

effective cyber risk oversight: 1) get educated; 2) be • Invite the CISO to strategy discussions on broader
engaged; and 3) stay informed. business and technology decisions.
• Schedule regular deep dives with the CISO, CIO,
First, Boards should get educated about key topics
CTO on risk priorities, budgets, and long-term
to ensure that cyber and broader technology risk
planning.
is embedded in operational risk and strategic
discussions and organizational decisions. This Third, Boards should stay informed about ongoing
includes understanding the impact cyber has on reporting activities, ask questions, and work with
risk management and resiliency frameworks. It also the CISO and other leaders to understand cyber
includes the Board of directors playing an integral role risk metrics. Boards should strive to create a robust
in overseeing any organization’s cloud-enabled digital feedback loop that encourages frank dialogue,
transformation. informed decision making, and continuous risk
management, in line with good practices for
Putting this in action operational risk management. Boards should also stay
• Assess Board structure and expertise; consider your engaged with relevant external organizations (like
committees and see which one is most appropriate Google) to stay informed of the latest cybersecurity
to oversee this risk. trends and practices. .

• Organize briefings and in-depth discussions with


Putting this in action
internal and external experts (e.g., Google Cloud,
law enforcement). • Understand the top risks to your organization and
how the business in partnership with the CISO plans
Second, Boards should be engaged with the CISO, to address them.
other C-Suite leaders and key business stakeholders
• Require a periodic report on the CISO’s efforts to
to build better relationships, and understand critical
evaluate risk, and track and measure progress.
gaps and resource needs while ensuring this risk is
• Stay engaged with peers and Google through our
treated as a priority for all executives – not just the
Cybersecurity Board Campaign.
cybersecurity team.

Boards can use these three principles to conduct


Boards must work with the CISO, along with
better oversight and help build a better relationship
technology, business, and compliance stakeholders to
with the CISO and company leadership. As the threat
identify top risks and quantify them, and assess how
landscape continues to evolve, however, Boards will
they align with overall risk appetite.
need to further adapt their approach. We explore
some of these trends in the next section.
Putting this in action

• Make cyber a key business priority by having line of


business leaders present on this risk as part of their
strategic business risks supported by the CISO.

5
Perspectives on Security for the Board: Edition 1
For more information, visit gcat.google.com

Helping Boards Navigate the Global


Threat Landscape
In 2022, Mandiant, now part of Google Cloud, helped their organization and why. In a recent survey of
over 1,800 customers prepare for or recover from the business and IT leaders, more than three-quarters of
most critical cybersecurity incidents. Through this respondents said that they make decisions without
ongoing, frontline engagement, our experts saw more insights on who could be targeting their organization
of everything: more zero-day vulnerabilities, more and only about one-third had a comprehensive
threat actor groups, more supply chain compromises, understanding of different threat groups and their
and more extortion tactics designed to hurt company tactics, techniques, and procedures. These visibility
reputations. We also observed unprecedented gaps mean defenses may not meet their intended
developments like the first time cyber operations goals.
played a prominent role in war. The threat landscape
remains dynamic and complex, and we expect these Boards can work to bridge these intelligence gaps
trends to continue in 2023 and beyond. and ensure this information is playing a leading role
in risk management decisions. To help encourage this
At the same time, we’ve seen several positive connection and consistent with the three principles for
cybersecurity trends emerge. First, cybersecurity effective oversight described above, Boards should
leaders believe that cloud modernization presents ask the CISO three key questions on a quarterly
better security improvement opportunities than with basis:
on-prem, including a step change in detection and
• How good are we at cybersecurity? Boards
response capabilities. Second, frontline defenders
should learn more about the people and expertise
are getting better at shortening the cybersecurity
on the cybersecurity team, and their experiences.
gap (i.e. the time it takes to discover a compromise
This is important because Boards can’t rely solely
and push out protections to organizations). When we
on compliance dashboards and cybersecurity
shorten that timeframe as a community, we raise the
controls to answer this question. Almost every
cybersecurity bar for everyone.
victim we respond to appears to have various
dashboards and controls–but Boards need to work
As Boards consider these trends, they must
to understand more about their team’s practical
understand the connection between threat
capacity to respond to events. One way to test your
intelligence and risk mitigation. In most cases,
cybersecurity team’s capabilities is to ask the CISO
cybersecurity leaders understand the need for better
to conduct Red Team exercises and request a copy
intelligence on threat actors, but many of them make
of the report.
decisions without fully understanding who is attacking

6
Perspectives on Security for the Board: Edition 1
For more information, visit gcat.google.com

(Helping Boards Navigate the Global Threat Landscape, cont’d.)

• How resilient are we? Boards should ask the In today’s threat environment, cybersecurity teams
CISO about how prepared your organization is to are under tremendous pressure to protect their
keep the business running through an event like a organizations from a variety of threats. For Boards,
ransomware attack. This is similar to planning for this means asking the right questions to ensure that
an earthquake or other disaster, and can involve relevant intelligence gets to the right stakeholders to
scenarios like operating off the Internet, restoring drive optimal cybersecurity and business decisions.
data back ups, etc. One way to assess resilience Boards can also work with the CISO to bring external
preparedness is to ask the CISO to conduct periodic cybersecurity partners like Google to the table to
cyber resilience exercises like a ransomware attack help translate frontline intelligence into actionable
to test organizational response. information.
• What is our risk? At a minimum, Boards should
ensure that the CISO’s risk management framework
addresses five key areas: 1) an assessment
of current threats to your organization; 2) an
explanation of what the cybersecurity leadership is
doing to mitigate against those threats; 3) examples
of how the CISO is testing whether mitigations are
working; 4) an assessment of the consequences if
those threats actually happen; and 5) an assessment
of risks that you aren’t going to mitigate, but will
otherwise accept. One way to get to the bottom of
this is to ask the CISO to present on this topic to the
full Board roughly twice a year.

7
Perspectives on Security for the Board: Edition 1
For more information, visit gcat.google.com

Board Engagement on Artificial


Intelligence and Cybersecurity
Organizations everywhere are seeking to leverage the
Putting this in action
power of AI – and rightly so. The smart applications of AI
enable organizations to improve, scale, and accelerate • Partner with the CISO to schedule a full Board
the decision-making process across most business review of the CISO’s plans to securely deploy
functions. We’re committed to helping developers AI systems, and determine whether additional
and organizations stay on top of these developments investment is needed.
– that’s why we recently announced new generative • Understand your organization’s data responsibilities
AI capabilities for our Google Cloud AI portfolio and and whether cybersecurity leaders have the right
committed to launching a range of products that tools to protect machine learning data.
responsibly infuse generative AI into our offerings.
Second, Boards should work with the CISO to
As Boards consider how to best support their understand how best to leverage the power of AI to
organizations on this journey, we encourage them achieve better cybersecurity outcomes at scale.
to take a bold and responsible approach to these While AI technologies don’t offer a one-stop solution
technologies. We were one of the first to introduce and for all cybersecurity problems, we’ve seen a few
advance responsible AI practices, and these principles early use cases emerge for how AI is helping to level
serve as an ongoing commitment to our customers the cybersecurity playing field, including detecting
worldwide who rely on our products to build and grow anomalous and malicious behavior, automating
their businesses safely. To maximize the benefits of AI cybersecurity recommendations, and scaling the
technologies and minimize risks, we recommend that productivity of cybersecurity specialists.
Boards work with the CISO to take a three-pronged
approach to secure, scale, and evolve. Putting this in action

• Request an annual briefing on your organization’s


First, Boards should understand how their organization
top cybersecurity pain points and how AI
plans to deploy secure AI systems. This includes a
technologies can solve them, which will help the
basic familiarity with how the CISO intends to protect
Board weigh potential investments.
data and control access to machine learning models
and AI applications. • Understand your organization’s long term
cybersecurity investment plan in AI technologies
and how it intersects with business priorities and
strategic decisions.

8
Perspectives on Security for the Board: Edition 1
For more information, visit gcat.google.com

(Board Engagement on Artificial Intelligence and Cybersecurity, cont’d.)

Third, the Board should work with the CISO to Together, our approach reinforces a continuous cycle
stay informed on developments in this space where frontline intelligence meets AI-powered
to anticipate threats. We operate from the basic cloud innovation. We’ll continue to explore these topics
assumption that attackers will seek out these in future Board Horizons reports.
technologies and attempt to use them to circumvent
defenses, and we’re building towards that future state.

Putting this in action

• Organize regular briefings from internal and external


experts to spot emerging AI trends and novel
security risks.
• Assess the CISO’s plans to partner with others to
develop best practices, tools, and threat models that
address typical AI interactions and risks.

Conclusion
Cybersecurity can be a challenging topic for Boards to oversee. To help address this challenge, Boards should
adopt three principles for effective cyber risk oversight: 1) get educated; 2) be engaged; and 3) stay informed.
This approach–coupled with a strong relationship with the CISO and technology, business, and compliance
stakeholders–will help foster greater transparency and collaboration between Boards and company leaders.
Moving forward, it is clear that Board awareness and subsequent guidance in this area is critical to every
organization’s long term success. At Google Cloud, we look forward to working with you towards that goal.
Please click here for more information.

Check out our Board of Directors Insights Hub for more actionable cybersecurity resources.

9
Perspectives on Security for the Board: Edition 1
For more information, visit gcat.google.com

Looking Back Threats to Organizations in December 2022


• Chinese, Iranian, North Korean and Russian espionage
• Data theft, extortion, and gaining access to
organizations
Threats to Organizations in January 2023 • Exploiting recently disclosed vulnerabilities
• Suspected Chinese and Russian espionage
• Data theft, and gaining access to organizations
• Distribution of malware via infected USB devices Threats to Organizations in February 2023
• Reconnaissance, and attempted compromises of • Suspected Russian and North Korean espionage
major cloud service providers
• Ransomware and data theft extortion, phishing
and spear phishing
• Government, research and education, operational
technology targeting

Looking Forward Learn from the past to prepare for the


future. We see continued interest in targeting
organizations across sectors worldwide. Boards
Prioritize efforts to understand AI must ensure their organization is prepared.
opportunities and risks. We see organizations
Ask your CISO:
are exploring how to leverage it to achieve better
cybersecurity outcomes at scale. • What assurance do we have that our organization is
prioritizing the right security capabilities against the
Ask your CISO: most relevant threats?

• What is our AI investment plan, and what are our plans • How are we using current threat intelligence to inform
to deploy AI securely? decisions?

• How are we preparing to manage data responsibilities • How are we testing our defenses? Do we conduct
with AI systems and what steps do we need to take to red team and tabletop exercises?
address them?
• What role will AI play in enhancing our cybersecurity
capabilities? Ensure you have a plan to protect users from
common attacks. Phishing is one of the most
common ways that attackers breach organizations.
Work with the CISO to better understand
They will also use techniques to bypass multi-
attackers and what they are after. Ransomware
factor authentication and abuse identity systems.
is a financially motivated extortion attack we
don’t see slowing down anytime soon. All Ask your CISO:
organizations are at risk and need to be ready. • What can our security, IT and business teams be doing
to protect all employees?
Ask your CISO:
• How are we minimizing the risk of social engineering
• What data and assets are most important to our organization, threats from reaching our employees?
and are they secure?
• How do we make our employees aware of phishing and
• Do we have a backup strategy if an attacker were to steal and other social engineering?
prevent access to our data?
• What is our strategy around adoption of phishing
• Have we performed ransomware defense assessments to resistant hardware/tokens?
test our ability to detect and respond to financial threats?

10

You might also like